pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +2 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  20. pulumi_vault/azure/auth_backend_config.py +6 -10
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +16 -24
  23. pulumi_vault/azure/backend_role.py +14 -18
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +75 -208
  26. pulumi_vault/consul/secret_backend.py +10 -18
  27. pulumi_vault/consul/secret_backend_role.py +2 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +2 -4
  31. pulumi_vault/database/secret_backend_role.py +4 -4
  32. pulumi_vault/database/secret_backend_static_role.py +10 -8
  33. pulumi_vault/database/secrets_mount.py +4 -4
  34. pulumi_vault/egp_policy.py +4 -8
  35. pulumi_vault/gcp/auth_backend.py +0 -36
  36. pulumi_vault/gcp/auth_backend_role.py +63 -264
  37. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  38. pulumi_vault/gcp/secret_backend.py +4 -6
  39. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  40. pulumi_vault/gcp/secret_roleset.py +4 -6
  41. pulumi_vault/gcp/secret_static_account.py +14 -16
  42. pulumi_vault/generic/endpoint.py +4 -8
  43. pulumi_vault/generic/get_secret.py +40 -4
  44. pulumi_vault/get_auth_backend.py +0 -4
  45. pulumi_vault/get_auth_backends.py +0 -8
  46. pulumi_vault/get_namespace.py +0 -12
  47. pulumi_vault/get_namespaces.py +4 -12
  48. pulumi_vault/get_nomad_access_token.py +0 -4
  49. pulumi_vault/get_policy_document.py +8 -8
  50. pulumi_vault/get_raft_autopilot_state.py +0 -4
  51. pulumi_vault/github/auth_backend.py +0 -4
  52. pulumi_vault/github/team.py +2 -6
  53. pulumi_vault/github/user.py +2 -6
  54. pulumi_vault/identity/entity.py +6 -8
  55. pulumi_vault/identity/entity_alias.py +6 -8
  56. pulumi_vault/identity/entity_policies.py +12 -12
  57. pulumi_vault/identity/get_entity.py +0 -4
  58. pulumi_vault/identity/get_group.py +0 -4
  59. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  60. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  61. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  62. pulumi_vault/identity/group.py +38 -42
  63. pulumi_vault/identity/group_alias.py +2 -4
  64. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  65. pulumi_vault/identity/group_member_group_ids.py +24 -20
  66. pulumi_vault/identity/group_policies.py +4 -8
  67. pulumi_vault/identity/mfa_duo.py +4 -8
  68. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  69. pulumi_vault/identity/mfa_okta.py +4 -8
  70. pulumi_vault/identity/mfa_pingid.py +0 -4
  71. pulumi_vault/identity/mfa_totp.py +0 -4
  72. pulumi_vault/identity/oidc.py +0 -4
  73. pulumi_vault/identity/oidc_assignment.py +10 -6
  74. pulumi_vault/identity/oidc_client.py +10 -10
  75. pulumi_vault/identity/oidc_key.py +16 -12
  76. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  77. pulumi_vault/identity/oidc_provider.py +22 -16
  78. pulumi_vault/identity/oidc_role.py +28 -20
  79. pulumi_vault/identity/oidc_scope.py +6 -8
  80. pulumi_vault/jwt/auth_backend.py +20 -32
  81. pulumi_vault/jwt/auth_backend_role.py +63 -190
  82. pulumi_vault/kmip/secret_backend.py +10 -14
  83. pulumi_vault/kmip/secret_role.py +0 -4
  84. pulumi_vault/kmip/secret_scope.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  86. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  87. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  88. pulumi_vault/kubernetes/secret_backend.py +6 -8
  89. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  90. pulumi_vault/kv/get_secret.py +0 -4
  91. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  92. pulumi_vault/kv/get_secret_v2.py +58 -0
  93. pulumi_vault/kv/get_secrets_list.py +4 -8
  94. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  95. pulumi_vault/kv/secret.py +0 -4
  96. pulumi_vault/kv/secret_backend_v2.py +0 -4
  97. pulumi_vault/kv/secret_v2.py +2 -4
  98. pulumi_vault/ldap/auth_backend.py +66 -161
  99. pulumi_vault/ldap/auth_backend_group.py +0 -4
  100. pulumi_vault/ldap/auth_backend_user.py +0 -4
  101. pulumi_vault/ldap/secret_backend.py +4 -8
  102. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  103. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  104. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  105. pulumi_vault/managed/_inputs.py +84 -132
  106. pulumi_vault/managed/keys.py +7 -28
  107. pulumi_vault/managed/outputs.py +84 -132
  108. pulumi_vault/mfa_duo.py +4 -6
  109. pulumi_vault/mfa_okta.py +4 -6
  110. pulumi_vault/mfa_pingid.py +4 -6
  111. pulumi_vault/mfa_totp.py +10 -12
  112. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  113. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  114. pulumi_vault/mount.py +26 -42
  115. pulumi_vault/nomad_secret_backend.py +4 -8
  116. pulumi_vault/nomad_secret_role.py +0 -4
  117. pulumi_vault/okta/_inputs.py +8 -8
  118. pulumi_vault/okta/auth_backend.py +6 -10
  119. pulumi_vault/okta/auth_backend_group.py +0 -4
  120. pulumi_vault/okta/auth_backend_user.py +0 -4
  121. pulumi_vault/okta/outputs.py +8 -8
  122. pulumi_vault/outputs.py +0 -20
  123. pulumi_vault/password_policy.py +6 -8
  124. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  126. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  128. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  130. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  131. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  134. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  135. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  136. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  138. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  139. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  140. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  141. pulumi_vault/quota_lease_count.py +6 -8
  142. pulumi_vault/quota_rate_limit.py +2 -4
  143. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  144. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  145. pulumi_vault/raft_autopilot.py +0 -4
  146. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  147. pulumi_vault/rgp_policy.py +2 -6
  148. pulumi_vault/saml/auth_backend.py +8 -12
  149. pulumi_vault/saml/auth_backend_role.py +64 -178
  150. pulumi_vault/secrets/sync_association.py +12 -10
  151. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  152. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  153. pulumi_vault/secrets/sync_config.py +2 -6
  154. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  155. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  156. pulumi_vault/secrets/sync_github_apps.py +8 -8
  157. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  158. pulumi_vault/ssh/_inputs.py +6 -32
  159. pulumi_vault/ssh/outputs.py +6 -32
  160. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  161. pulumi_vault/ssh/secret_backend_role.py +4 -4
  162. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  163. pulumi_vault/terraformcloud/secret_creds.py +2 -4
  164. pulumi_vault/terraformcloud/secret_role.py +2 -4
  165. pulumi_vault/token.py +14 -18
  166. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  167. pulumi_vault/transform/alphabet.py +4 -6
  168. pulumi_vault/transform/get_decode.py +4 -4
  169. pulumi_vault/transform/get_encode.py +4 -4
  170. pulumi_vault/transform/role.py +4 -6
  171. pulumi_vault/transform/template.py +4 -4
  172. pulumi_vault/transit/get_decrypt.py +4 -20
  173. pulumi_vault/transit/get_encrypt.py +0 -14
  174. pulumi_vault/transit/secret_backend_key.py +6 -6
  175. pulumi_vault/transit/secret_cache_config.py +0 -4
  176. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
  177. pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
  178. pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
  179. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
  180. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -348,7 +348,6 @@ class AuthBackendConfig(pulumi.CustomResource):
348
348
 
349
349
  ## Example Usage
350
350
 
351
- <!--Start PulumiCodeChooser -->
352
351
  ```python
353
352
  import pulumi
354
353
  import pulumi_vault as vault
@@ -364,7 +363,6 @@ class AuthBackendConfig(pulumi.CustomResource):
364
363
  issuer="api",
365
364
  disable_iss_validation=True)
366
365
  ```
367
- <!--End PulumiCodeChooser -->
368
366
 
369
367
  ## Import
370
368
 
@@ -402,7 +400,6 @@ class AuthBackendConfig(pulumi.CustomResource):
402
400
 
403
401
  ## Example Usage
404
402
 
405
- <!--Start PulumiCodeChooser -->
406
403
  ```python
407
404
  import pulumi
408
405
  import pulumi_vault as vault
@@ -418,7 +415,6 @@ class AuthBackendConfig(pulumi.CustomResource):
418
415
  issuer="api",
419
416
  disable_iss_validation=True)
420
417
  ```
421
- <!--End PulumiCodeChooser -->
422
418
 
423
419
  ## Import
424
420
 
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
47
47
  The value should not contain leading or trailing forward slashes.
48
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
49
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
51
- addresses which can authenticate successfully, and ties the resulting token to these blocks
52
- as well.
53
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
54
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
55
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
56
- `token_max_ttl` would otherwise allow a renewal.
57
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
58
- Its current value will be referenced at renewal time.
59
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
- generated tokens; otherwise it will be added to the policies set in token_policies.
61
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
62
- of times a generated token may be used (within its lifetime); 0 means unlimited.
63
- :param pulumi.Input[int] token_period: If set, indicates that the
64
- token generated using this role should never expire. The token should be renewed within the
65
- duration specified by this value. At each renewal, the token's TTL will be set to the
66
- value of this field. Specified in seconds.
67
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
68
- on the auth method, this list may be supplemented by user/group/other values.
50
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
53
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
54
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
55
+ :param pulumi.Input[int] token_period: Generated Token's Period
56
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
69
57
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
70
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
71
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
72
- `service` tokens). For token store roles, there are two additional possibilities:
73
- `default-service` and `default-batch` which specify the type to return unless the client
74
- requests a different type at generation time.
58
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
75
59
  """
76
60
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
77
61
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
@@ -199,9 +183,7 @@ class AuthBackendRoleArgs:
199
183
  @pulumi.getter(name="tokenBoundCidrs")
200
184
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
201
185
  """
202
- List of CIDR blocks; if set, specifies blocks of IP
203
- addresses which can authenticate successfully, and ties the resulting token to these blocks
204
- as well.
186
+ Specifies the blocks of IP addresses which are allowed to use the generated token
205
187
  """
206
188
  return pulumi.get(self, "token_bound_cidrs")
207
189
 
@@ -213,10 +195,7 @@ class AuthBackendRoleArgs:
213
195
  @pulumi.getter(name="tokenExplicitMaxTtl")
214
196
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
215
197
  """
216
- If set, will encode an
217
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
218
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
219
- `token_max_ttl` would otherwise allow a renewal.
198
+ Generated Token's Explicit Maximum TTL in seconds
220
199
  """
221
200
  return pulumi.get(self, "token_explicit_max_ttl")
222
201
 
@@ -228,8 +207,7 @@ class AuthBackendRoleArgs:
228
207
  @pulumi.getter(name="tokenMaxTtl")
229
208
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
230
209
  """
231
- The maximum lifetime for generated tokens in number of seconds.
232
- Its current value will be referenced at renewal time.
210
+ The maximum lifetime of the generated token
233
211
  """
234
212
  return pulumi.get(self, "token_max_ttl")
235
213
 
@@ -241,8 +219,7 @@ class AuthBackendRoleArgs:
241
219
  @pulumi.getter(name="tokenNoDefaultPolicy")
242
220
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
243
221
  """
244
- If set, the default policy will not be set on
245
- generated tokens; otherwise it will be added to the policies set in token_policies.
222
+ If true, the 'default' policy will not automatically be added to generated tokens
246
223
  """
247
224
  return pulumi.get(self, "token_no_default_policy")
248
225
 
@@ -254,8 +231,7 @@ class AuthBackendRoleArgs:
254
231
  @pulumi.getter(name="tokenNumUses")
255
232
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
256
233
  """
257
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
258
- of times a generated token may be used (within its lifetime); 0 means unlimited.
234
+ The maximum number of times a token may be used, a value of zero means unlimited
259
235
  """
260
236
  return pulumi.get(self, "token_num_uses")
261
237
 
@@ -267,10 +243,7 @@ class AuthBackendRoleArgs:
267
243
  @pulumi.getter(name="tokenPeriod")
268
244
  def token_period(self) -> Optional[pulumi.Input[int]]:
269
245
  """
270
- If set, indicates that the
271
- token generated using this role should never expire. The token should be renewed within the
272
- duration specified by this value. At each renewal, the token's TTL will be set to the
273
- value of this field. Specified in seconds.
246
+ Generated Token's Period
274
247
  """
275
248
  return pulumi.get(self, "token_period")
276
249
 
@@ -282,8 +255,7 @@ class AuthBackendRoleArgs:
282
255
  @pulumi.getter(name="tokenPolicies")
283
256
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
284
257
  """
285
- List of policies to encode onto generated tokens. Depending
286
- on the auth method, this list may be supplemented by user/group/other values.
258
+ Generated Token's Policies
287
259
  """
288
260
  return pulumi.get(self, "token_policies")
289
261
 
@@ -307,11 +279,7 @@ class AuthBackendRoleArgs:
307
279
  @pulumi.getter(name="tokenType")
308
280
  def token_type(self) -> Optional[pulumi.Input[str]]:
309
281
  """
310
- The type of token that should be generated. Can be `service`,
311
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
312
- `service` tokens). For token store roles, there are two additional possibilities:
313
- `default-service` and `default-batch` which specify the type to return unless the client
314
- requests a different type at generation time.
282
+ The type of token to generate, service or batch
315
283
  """
316
284
  return pulumi.get(self, "token_type")
317
285
 
@@ -356,31 +324,15 @@ class _AuthBackendRoleState:
356
324
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
357
325
  *Available only for Vault Enterprise*.
358
326
  :param pulumi.Input[str] role_name: Name of the role.
359
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
360
- addresses which can authenticate successfully, and ties the resulting token to these blocks
361
- as well.
362
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
363
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
364
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
365
- `token_max_ttl` would otherwise allow a renewal.
366
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
367
- Its current value will be referenced at renewal time.
368
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
369
- generated tokens; otherwise it will be added to the policies set in token_policies.
370
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
371
- of times a generated token may be used (within its lifetime); 0 means unlimited.
372
- :param pulumi.Input[int] token_period: If set, indicates that the
373
- token generated using this role should never expire. The token should be renewed within the
374
- duration specified by this value. At each renewal, the token's TTL will be set to the
375
- value of this field. Specified in seconds.
376
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
377
- on the auth method, this list may be supplemented by user/group/other values.
327
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
328
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
329
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
330
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
331
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
332
+ :param pulumi.Input[int] token_period: Generated Token's Period
333
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
378
334
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
379
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
380
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
381
- `service` tokens). For token store roles, there are two additional possibilities:
382
- `default-service` and `default-batch` which specify the type to return unless the client
383
- requests a different type at generation time.
335
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
384
336
  """
385
337
  if alias_name_source is not None:
386
338
  pulumi.set(__self__, "alias_name_source", alias_name_source)
@@ -511,9 +463,7 @@ class _AuthBackendRoleState:
511
463
  @pulumi.getter(name="tokenBoundCidrs")
512
464
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
513
465
  """
514
- List of CIDR blocks; if set, specifies blocks of IP
515
- addresses which can authenticate successfully, and ties the resulting token to these blocks
516
- as well.
466
+ Specifies the blocks of IP addresses which are allowed to use the generated token
517
467
  """
518
468
  return pulumi.get(self, "token_bound_cidrs")
519
469
 
@@ -525,10 +475,7 @@ class _AuthBackendRoleState:
525
475
  @pulumi.getter(name="tokenExplicitMaxTtl")
526
476
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
527
477
  """
528
- If set, will encode an
529
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
530
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
531
- `token_max_ttl` would otherwise allow a renewal.
478
+ Generated Token's Explicit Maximum TTL in seconds
532
479
  """
533
480
  return pulumi.get(self, "token_explicit_max_ttl")
534
481
 
@@ -540,8 +487,7 @@ class _AuthBackendRoleState:
540
487
  @pulumi.getter(name="tokenMaxTtl")
541
488
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
542
489
  """
543
- The maximum lifetime for generated tokens in number of seconds.
544
- Its current value will be referenced at renewal time.
490
+ The maximum lifetime of the generated token
545
491
  """
546
492
  return pulumi.get(self, "token_max_ttl")
547
493
 
@@ -553,8 +499,7 @@ class _AuthBackendRoleState:
553
499
  @pulumi.getter(name="tokenNoDefaultPolicy")
554
500
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
555
501
  """
556
- If set, the default policy will not be set on
557
- generated tokens; otherwise it will be added to the policies set in token_policies.
502
+ If true, the 'default' policy will not automatically be added to generated tokens
558
503
  """
559
504
  return pulumi.get(self, "token_no_default_policy")
560
505
 
@@ -566,8 +511,7 @@ class _AuthBackendRoleState:
566
511
  @pulumi.getter(name="tokenNumUses")
567
512
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
568
513
  """
569
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
570
- of times a generated token may be used (within its lifetime); 0 means unlimited.
514
+ The maximum number of times a token may be used, a value of zero means unlimited
571
515
  """
572
516
  return pulumi.get(self, "token_num_uses")
573
517
 
@@ -579,10 +523,7 @@ class _AuthBackendRoleState:
579
523
  @pulumi.getter(name="tokenPeriod")
580
524
  def token_period(self) -> Optional[pulumi.Input[int]]:
581
525
  """
582
- If set, indicates that the
583
- token generated using this role should never expire. The token should be renewed within the
584
- duration specified by this value. At each renewal, the token's TTL will be set to the
585
- value of this field. Specified in seconds.
526
+ Generated Token's Period
586
527
  """
587
528
  return pulumi.get(self, "token_period")
588
529
 
@@ -594,8 +535,7 @@ class _AuthBackendRoleState:
594
535
  @pulumi.getter(name="tokenPolicies")
595
536
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
596
537
  """
597
- List of policies to encode onto generated tokens. Depending
598
- on the auth method, this list may be supplemented by user/group/other values.
538
+ Generated Token's Policies
599
539
  """
600
540
  return pulumi.get(self, "token_policies")
601
541
 
@@ -619,11 +559,7 @@ class _AuthBackendRoleState:
619
559
  @pulumi.getter(name="tokenType")
620
560
  def token_type(self) -> Optional[pulumi.Input[str]]:
621
561
  """
622
- The type of token that should be generated. Can be `service`,
623
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
624
- `service` tokens). For token store roles, there are two additional possibilities:
625
- `default-service` and `default-batch` which specify the type to return unless the client
626
- requests a different type at generation time.
562
+ The type of token to generate, service or batch
627
563
  """
628
564
  return pulumi.get(self, "token_type")
629
565
 
@@ -661,7 +597,6 @@ class AuthBackendRole(pulumi.CustomResource):
661
597
 
662
598
  ## Example Usage
663
599
 
664
- <!--Start PulumiCodeChooser -->
665
600
  ```python
666
601
  import pulumi
667
602
  import pulumi_vault as vault
@@ -680,7 +615,6 @@ class AuthBackendRole(pulumi.CustomResource):
680
615
  ],
681
616
  audience="vault")
682
617
  ```
683
- <!--End PulumiCodeChooser -->
684
618
 
685
619
  ## Import
686
620
 
@@ -707,31 +641,15 @@ class AuthBackendRole(pulumi.CustomResource):
707
641
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
708
642
  *Available only for Vault Enterprise*.
709
643
  :param pulumi.Input[str] role_name: Name of the role.
710
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
711
- addresses which can authenticate successfully, and ties the resulting token to these blocks
712
- as well.
713
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
714
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
715
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
716
- `token_max_ttl` would otherwise allow a renewal.
717
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
718
- Its current value will be referenced at renewal time.
719
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
720
- generated tokens; otherwise it will be added to the policies set in token_policies.
721
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
722
- of times a generated token may be used (within its lifetime); 0 means unlimited.
723
- :param pulumi.Input[int] token_period: If set, indicates that the
724
- token generated using this role should never expire. The token should be renewed within the
725
- duration specified by this value. At each renewal, the token's TTL will be set to the
726
- value of this field. Specified in seconds.
727
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
728
- on the auth method, this list may be supplemented by user/group/other values.
644
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
645
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
646
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
647
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
648
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
649
+ :param pulumi.Input[int] token_period: Generated Token's Period
650
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
729
651
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
730
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
731
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
732
- `service` tokens). For token store roles, there are two additional possibilities:
733
- `default-service` and `default-batch` which specify the type to return unless the client
734
- requests a different type at generation time.
652
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
735
653
  """
736
654
  ...
737
655
  @overload
@@ -746,7 +664,6 @@ class AuthBackendRole(pulumi.CustomResource):
746
664
 
747
665
  ## Example Usage
748
666
 
749
- <!--Start PulumiCodeChooser -->
750
667
  ```python
751
668
  import pulumi
752
669
  import pulumi_vault as vault
@@ -765,7 +682,6 @@ class AuthBackendRole(pulumi.CustomResource):
765
682
  ],
766
683
  audience="vault")
767
684
  ```
768
- <!--End PulumiCodeChooser -->
769
685
 
770
686
  ## Import
771
687
 
@@ -885,31 +801,15 @@ class AuthBackendRole(pulumi.CustomResource):
885
801
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
886
802
  *Available only for Vault Enterprise*.
887
803
  :param pulumi.Input[str] role_name: Name of the role.
888
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
889
- addresses which can authenticate successfully, and ties the resulting token to these blocks
890
- as well.
891
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
892
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
- `token_max_ttl` would otherwise allow a renewal.
895
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
896
- Its current value will be referenced at renewal time.
897
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
898
- generated tokens; otherwise it will be added to the policies set in token_policies.
899
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
900
- of times a generated token may be used (within its lifetime); 0 means unlimited.
901
- :param pulumi.Input[int] token_period: If set, indicates that the
902
- token generated using this role should never expire. The token should be renewed within the
903
- duration specified by this value. At each renewal, the token's TTL will be set to the
904
- value of this field. Specified in seconds.
905
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
906
- on the auth method, this list may be supplemented by user/group/other values.
804
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
805
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
806
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
807
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
808
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
809
+ :param pulumi.Input[int] token_period: Generated Token's Period
810
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
907
811
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
908
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
909
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
910
- `service` tokens). For token store roles, there are two additional possibilities:
911
- `default-service` and `default-batch` which specify the type to return unless the client
912
- requests a different type at generation time.
812
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
913
813
  """
914
814
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
915
815
 
@@ -1001,9 +901,7 @@ class AuthBackendRole(pulumi.CustomResource):
1001
901
  @pulumi.getter(name="tokenBoundCidrs")
1002
902
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1003
903
  """
1004
- List of CIDR blocks; if set, specifies blocks of IP
1005
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1006
- as well.
904
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1007
905
  """
1008
906
  return pulumi.get(self, "token_bound_cidrs")
1009
907
 
@@ -1011,10 +909,7 @@ class AuthBackendRole(pulumi.CustomResource):
1011
909
  @pulumi.getter(name="tokenExplicitMaxTtl")
1012
910
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1013
911
  """
1014
- If set, will encode an
1015
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1016
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1017
- `token_max_ttl` would otherwise allow a renewal.
912
+ Generated Token's Explicit Maximum TTL in seconds
1018
913
  """
1019
914
  return pulumi.get(self, "token_explicit_max_ttl")
1020
915
 
@@ -1022,8 +917,7 @@ class AuthBackendRole(pulumi.CustomResource):
1022
917
  @pulumi.getter(name="tokenMaxTtl")
1023
918
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1024
919
  """
1025
- The maximum lifetime for generated tokens in number of seconds.
1026
- Its current value will be referenced at renewal time.
920
+ The maximum lifetime of the generated token
1027
921
  """
1028
922
  return pulumi.get(self, "token_max_ttl")
1029
923
 
@@ -1031,8 +925,7 @@ class AuthBackendRole(pulumi.CustomResource):
1031
925
  @pulumi.getter(name="tokenNoDefaultPolicy")
1032
926
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1033
927
  """
1034
- If set, the default policy will not be set on
1035
- generated tokens; otherwise it will be added to the policies set in token_policies.
928
+ If true, the 'default' policy will not automatically be added to generated tokens
1036
929
  """
1037
930
  return pulumi.get(self, "token_no_default_policy")
1038
931
 
@@ -1040,8 +933,7 @@ class AuthBackendRole(pulumi.CustomResource):
1040
933
  @pulumi.getter(name="tokenNumUses")
1041
934
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1042
935
  """
1043
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
1044
- of times a generated token may be used (within its lifetime); 0 means unlimited.
936
+ The maximum number of times a token may be used, a value of zero means unlimited
1045
937
  """
1046
938
  return pulumi.get(self, "token_num_uses")
1047
939
 
@@ -1049,10 +941,7 @@ class AuthBackendRole(pulumi.CustomResource):
1049
941
  @pulumi.getter(name="tokenPeriod")
1050
942
  def token_period(self) -> pulumi.Output[Optional[int]]:
1051
943
  """
1052
- If set, indicates that the
1053
- token generated using this role should never expire. The token should be renewed within the
1054
- duration specified by this value. At each renewal, the token's TTL will be set to the
1055
- value of this field. Specified in seconds.
944
+ Generated Token's Period
1056
945
  """
1057
946
  return pulumi.get(self, "token_period")
1058
947
 
@@ -1060,8 +949,7 @@ class AuthBackendRole(pulumi.CustomResource):
1060
949
  @pulumi.getter(name="tokenPolicies")
1061
950
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1062
951
  """
1063
- List of policies to encode onto generated tokens. Depending
1064
- on the auth method, this list may be supplemented by user/group/other values.
952
+ Generated Token's Policies
1065
953
  """
1066
954
  return pulumi.get(self, "token_policies")
1067
955
 
@@ -1077,11 +965,7 @@ class AuthBackendRole(pulumi.CustomResource):
1077
965
  @pulumi.getter(name="tokenType")
1078
966
  def token_type(self) -> pulumi.Output[Optional[str]]:
1079
967
  """
1080
- The type of token that should be generated. Can be `service`,
1081
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1082
- `service` tokens). For token store roles, there are two additional possibilities:
1083
- `default-service` and `default-batch` which specify the type to return unless the client
1084
- requests a different type at generation time.
968
+ The type of token to generate, service or batch
1085
969
  """
1086
970
  return pulumi.get(self, "token_type")
1087
971
 
@@ -180,20 +180,21 @@ def get_service_account_token(backend: Optional[str] = None,
180
180
  """
181
181
  ## Example Usage
182
182
 
183
- <!--Start PulumiCodeChooser -->
184
183
  ```python
185
184
  import pulumi
185
+ import pulumi_std as std
186
186
  import pulumi_vault as vault
187
187
 
188
188
  config = vault.kubernetes.SecretBackend("config",
189
189
  path="kubernetes",
190
190
  description="kubernetes secrets engine description",
191
191
  kubernetes_host="https://127.0.0.1:61233",
192
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
193
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
192
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
193
+ service_account_jwt=std.file(input="/path/to/token").result,
194
194
  disable_local_ca_jwt=False)
195
195
  role = vault.kubernetes.SecretBackendRole("role",
196
196
  backend=config.path,
197
+ name="service-account-name-role",
197
198
  allowed_kubernetes_namespaces=["*"],
198
199
  token_max_ttl=43200,
199
200
  token_default_ttl=21600,
@@ -212,7 +213,6 @@ def get_service_account_token(backend: Optional[str] = None,
212
213
  cluster_role_binding=False,
213
214
  ttl="1h")
214
215
  ```
215
- <!--End PulumiCodeChooser -->
216
216
 
217
217
 
218
218
  :param str backend: The Kubernetes secret backend to generate service account
@@ -267,20 +267,21 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
267
267
  """
268
268
  ## Example Usage
269
269
 
270
- <!--Start PulumiCodeChooser -->
271
270
  ```python
272
271
  import pulumi
272
+ import pulumi_std as std
273
273
  import pulumi_vault as vault
274
274
 
275
275
  config = vault.kubernetes.SecretBackend("config",
276
276
  path="kubernetes",
277
277
  description="kubernetes secrets engine description",
278
278
  kubernetes_host="https://127.0.0.1:61233",
279
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
280
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
279
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
280
+ service_account_jwt=std.file(input="/path/to/token").result,
281
281
  disable_local_ca_jwt=False)
282
282
  role = vault.kubernetes.SecretBackendRole("role",
283
283
  backend=config.path,
284
+ name="service-account-name-role",
284
285
  allowed_kubernetes_namespaces=["*"],
285
286
  token_max_ttl=43200,
286
287
  token_default_ttl=21600,
@@ -299,7 +300,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
299
300
  cluster_role_binding=False,
300
301
  ttl="1h")
301
302
  ```
302
- <!--End PulumiCodeChooser -->
303
303
 
304
304
 
305
305
  :param str backend: The Kubernetes secret backend to generate service account
@@ -623,9 +623,9 @@ class SecretBackend(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
- <!--Start PulumiCodeChooser -->
627
626
  ```python
628
627
  import pulumi
628
+ import pulumi_std as std
629
629
  import pulumi_vault as vault
630
630
 
631
631
  config = vault.kubernetes.SecretBackend("config",
@@ -634,11 +634,10 @@ class SecretBackend(pulumi.CustomResource):
634
634
  default_lease_ttl_seconds=43200,
635
635
  max_lease_ttl_seconds=86400,
636
636
  kubernetes_host="https://127.0.0.1:61233",
637
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
638
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
637
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
638
+ service_account_jwt=std.file(input="/path/to/token").result,
639
639
  disable_local_ca_jwt=False)
640
640
  ```
641
- <!--End PulumiCodeChooser -->
642
641
 
643
642
  ## Import
644
643
 
@@ -687,9 +686,9 @@ class SecretBackend(pulumi.CustomResource):
687
686
  """
688
687
  ## Example Usage
689
688
 
690
- <!--Start PulumiCodeChooser -->
691
689
  ```python
692
690
  import pulumi
691
+ import pulumi_std as std
693
692
  import pulumi_vault as vault
694
693
 
695
694
  config = vault.kubernetes.SecretBackend("config",
@@ -698,11 +697,10 @@ class SecretBackend(pulumi.CustomResource):
698
697
  default_lease_ttl_seconds=43200,
699
698
  max_lease_ttl_seconds=86400,
700
699
  kubernetes_host="https://127.0.0.1:61233",
701
- kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
702
- service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
700
+ kubernetes_ca_cert=std.file(input="/path/to/cert").result,
701
+ service_account_jwt=std.file(input="/path/to/token").result,
703
702
  disable_local_ca_jwt=False)
704
703
  ```
705
- <!--End PulumiCodeChooser -->
706
704
 
707
705
  ## Import
708
706